General

  • Target

    2024-04-25_16e02981c8cbf5d3dcbd675898c9eb14_cryptolocker

  • Size

    55KB

  • MD5

    16e02981c8cbf5d3dcbd675898c9eb14

  • SHA1

    15674d36ee5f1389a2e9721fd0e90f897c4bdc4b

  • SHA256

    bf469925d29a35aea070c35b352f443e9f5cdec9d89cacbb99d7d875dc1db759

  • SHA512

    d08a5fa72bd97eee7c4e04de703c8a0181f38fe20f574a3b5e68fcd5667c8d3ae347f2b82b589865438502be1b8492738a63230c3603fd0ce73a74cb211bd272

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjt:bP9g/xtCS3Dxx0M

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_16e02981c8cbf5d3dcbd675898c9eb14_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections